R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen et al., The Flask security architecture: system support for diverse security policies, Proceedings of the 8th USENIX Security Symposium, pp.123-139, 1999.

P. Loscocco and S. Smalley, Integrating flexible support for security policies into the linux operating system, Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, 2001.

C. Vance and R. Watson, Security Enhanced BSD, Network Associates Laboratories, 2003.

T. Garfinkel and M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, Proceedings of the 10th Annual Network and Distributed Systems Security Symposium, 2003.

X. Jiang, X. Wang, and D. Xu, Stealthy malware detection through vmm-b out-ofthe-b semantic view reconstruction, Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.128-138, 2007.
DOI : 10.1145/1315245.1315262

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.7412

B. D. Payne, M. Carbone, M. Sharif, and W. Lee, Lares: An Architecture for Secure Active Monitoring Using Virtualization, 2008 IEEE Symposium on Security and Privacy (sp 2008), p.233247, 2008.
DOI : 10.1109/SP.2008.24

L. Litty, H. A. Lagar-cavilla, and D. Lie, Hypervisor support for identifying covertly executing binaries, Proceedings of the 17th USENIX Security Symposium, p.258, 2008.

M. Sharif, W. Lee, W. Cui, and A. Lanzi, Secure in-VM monitoring using hardware virtualization, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, p.477487, 2009.
DOI : 10.1145/1653662.1653720

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.3959

Z. Wang, X. Jiang, W. Cui, and P. Ning, Countering kernel rootkits with lightweight hook protection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.545-554, 2009.
DOI : 10.1145/1653662.1653728

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.9928

S. T. King, P. M. Chen, Y. Wang, C. Verbowski, H. J. Wang et al., SubVirt: implementing malware with virtual machines, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006.
DOI : 10.1109/SP.2006.38

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.684.4485

R. Wojtczuk and J. Rutkowska, Xen 0wning trilogy, Black Hat conference, 2008.

J. Wang, A. Stavrou, and A. K. Ghosh, HyperCheck: A Hardware-Assisted Integrity Monitor, Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, 2010.
DOI : 10.1007/978-3-642-15512-3_9

A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang et al., HyperSentry, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.38-49, 2010.
DOI : 10.1145/1866307.1866313

Z. Wang and X. Jiang, HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.7292

X. Wang, J. Zang, Z. Wang, Y. Luo, and X. Li, Selective hardware/software memory virtualization, proceedings of the 7th ACM Conference on Virtual Execution Environments, p.217226, 2011.
DOI : 10.1145/2007477.1952710

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.8666

S. Devine, E. Bugnion, and M. Rosenblum, Virtualization system including a virtual machine monitor for a computer with a segmented architecture, p.6397242, 1998.

C. Shuo, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Lyer, Non-control-data attacks are realistic threats, Proceedings of the 14th conference on USENIX Security Symposium, 2005.

P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the art of virtualization, Proceedings of the Symposium on Operating System Principles, 2003.